Google Search Appliance Security User Manual
Page 6
![background image](/manuals/552812/6/background.png)
6
Use the following table to model each content source. Include information about security in the Security
Mechanisms field.
System Info
Name of the system, and underlying product name
Description
More description
Content Type
For example, are they office documents, web pages? database records?
Content Size
Document count—smaller content size could mean that late binding for
serve time authorization might be OK
Serve time
authentication
Is the content server using Windows Integrated Authentication?
Is the content server integrated with an SSO system?
If the content server has its own user directory in either database or LDAP, are
the user names synced with the company wide directory?
Serve time
authorization
How responsive is the content server? If it’s not responsive, late binding is
probably out of the question.
Are the permissions on the documents fairly open, or very restrictive? If very
restrictive, later binding is probably out of the question.
Is there an API that can tell whether a user has access to a list of documents
given the user name and document IDs? If there is such an API, connector or
SAML authorization will be possible
Is there a way to find out what groups/roles/users have access to each
document? If the answer is “Yes,” then ACL authorization is most likely the
preferred approach.